39,841
40K
software
eye 39,841
favorite 15
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 6 reviews )
56,033
56K
software
eye 56,033
favorite 10
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
53,332
53K
software
eye 53,332
favorite 14
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
44,133
44K
software
eye 44,133
favorite 4
comment 5
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 5 reviews )
72,152
72K
software
eye 72,152
favorite 10
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
27,858
28K
software
eye 27,858
favorite 8
comment 5
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 5 reviews )
17,257
17K
software
eye 17,257
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
45,484
45K
software
eye 45,484
favorite 5
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 3 reviews )
32,763
33K
software
eye 32,763
favorite 6
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
14,759
15K
software
eye 14,759
favorite 3
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
21,243
21K
software
eye 21,243
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
16,288
16K
software
eye 16,288
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 2 reviews )
9,166
9.2K
software
eye 9,166
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
10,010
10K
software
eye 10,010
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
7,170
7.2K
software
eye 7,170
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
14,324
14K
software
eye 14,324
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
19,678
20K
software
eye 19,678
favorite 2
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
83,425
83K
software
eye 83,425
favorite 3
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
3,039
3.0K
software
eye 3,039
favorite 1
comment 0
Malware Example: PPSCARE.COM *PPSCARE.COM - upon invocation, PingPongScare (tm) will become resident and clutter the screen with the characteristic "bouncing ball" of the PingPong boot block infector. Computing can continue while PingPongScare is in effect.
6,193
6.2K
Feb 24, 2016
02/16
by
Daniel White
movies
eye 6,193
favorite 3
comment 2
A quick presentation on Virus History by Daniel White at Project Cyber Virus, held on May 5th, 2015 at Swissnex San Francisco. In 2004, Daniel White’s computer was infected with the Sasser worm, a fast-spreading autonomous worm that made millions of computers around the world reboot continuously. Fascinated by the concept of malware, he spent the following years learning everything he could about the subject, from general malware news to specific details of every virus, becoming a self-taught...
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
Topics: Virus, History, Malware
12,061
12K
software
eye 12,061
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
9,618
9.6K
software
eye 9,618
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
2,856
2.9K
software
eye 2,856
favorite 2
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,639
2.6K
software
eye 2,639
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
12,232
12K
software
eye 12,232
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,305
3.3K
software
eye 3,305
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
5,283
5.3K
software
eye 5,283
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,851
3.9K
software
eye 3,851
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
2,838
2.8K
software
eye 2,838
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
2,428
2.4K
software
eye 2,428
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
7,673
7.7K
software
eye 7,673
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
19,474
19K
Feb 5, 2016
02/16
by
Mikko Hypponen
movies
eye 19,474
favorite 18
comment 0
Presented at DEF CON 19 in Las Vegas, Nevada in 2011. "It's 2011, so this year it's going to be 25 years since Brain.A, the first PC virus, Join Mikko Hypponen as he talks about the history and evolution of computer viruses. From Brain to Stuxnet, he's spent his career tracking malware and will give a pretty good rundown on what has happened, when and why it mattered. Mikko Hypponen is based in Helsinki, Finland. He has been analysing computer viruses for more than 20 years. He has written...
6,633
6.6K
software
eye 6,633
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
15,709
16K
software
eye 15,709
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
5,927
5.9K
software
eye 5,927
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,924
3.9K
software
eye 3,924
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,945
3.9K
software
eye 3,945
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
4,980
5.0K
software
eye 4,980
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
9,455
9.5K
software
eye 9,455
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
3,104
3.1K
software
eye 3,104
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
5,714
5.7K
software
eye 5,714
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
3,798
3.8K
software
eye 3,798
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
6,039
6.0K
software
eye 6,039
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
2,907
2.9K
software
eye 2,907
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
6,934
6.9K
software
eye 6,934
favorite 3
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
11,801
12K
software
eye 11,801
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
13,033
13K
software
eye 13,033
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
2,937
2.9K
software
eye 2,937
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,620
2.6K
software
eye 2,620
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,676
2.7K
software
eye 2,676
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
2,516
2.5K
software
eye 2,516
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,819
2.8K
software
eye 2,819
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
3,181
3.2K
software
eye 3,181
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
6,588
6.6K
software
eye 6,588
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
4,396
4.4K
software
eye 4,396
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
2,509
2.5K
software
eye 2,509
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
10,793
11K
software
eye 10,793
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
1,321
1.3K
software
eye 1,321
favorite 0
comment 0
Malware Example: DENSCARE.COM *DENSCARE.COM - upon invocation, DenZukoScare (tm) immediately displays the popular DEN ZUK virus graphic effect and exits.
2,697
2.7K
software
eye 2,697
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
10,849
11K
software
eye 10,849
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
2,578
2.6K
software
eye 2,578
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
2,515
2.5K
software
eye 2,515
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
2,482
2.5K
software
eye 2,482
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,489
2.5K
software
eye 2,489
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
1,569
1.6K
Feb 11, 2016
02/16
by
Mikko Hyppönen
texts
eye 1,569
favorite 2
comment 0
This paper categorizes different types of virus activation routines which are found in existing viruses and also discusses what triggers these activation routines. Common viruses are used as examples where possible. This paper also covers why it is important to know what a virus exactly does if you are infected by one. Some horror stories of the worst possible activation routine in a virus are also included. The scope of this paper is limited to PC compatible machines.
Topics: virus, viruses, activation, routines, routine, antivirus, user, mosaic, hard, machine, activation...
2,483
2.5K
software
eye 2,483
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
3,095
3.1K
software
eye 3,095
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
3,073
3.1K
software
eye 3,073
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
2,519
2.5K
software
eye 2,519
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
1,851
1.9K
software
eye 1,851
favorite 0
comment 0
Malware Example: CASCARE.COM *CASCARE.COM - upon invocation, CascadeScare (tm) will become resident. After a brief pause, the characteristic rat-a-tat sound of the Cascade virus and its nifty falling letters effect will be seen. This will continue intermittently, for as long as CascadeScare is resident. If the computer is in graphics mode, only the rat-a-tat sound effect will be noticed.
2,281
2.3K
software
eye 2,281
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,483
2.5K
software
eye 2,483
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,488
2.5K
software
eye 2,488
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
2,509
2.5K
software
eye 2,509
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
2,037
2.0K
software
eye 2,037
favorite 0
comment 0
Malware Example: JERSCARE.COM *JERSCARE.COM - upon invocation, JerusalemScare (tm) becomes resident. After a short period of time - about a minute on most systems - Jerusa- lemScare will effect the characteristic Jerusalem virus system slowdown and scrolling black window effect on the left side of the monitor.